US20160066181A1 - Control and Enhancement of Direct Wireless Service Communications - Google Patents
Control and Enhancement of Direct Wireless Service Communications Download PDFInfo
- Publication number
- US20160066181A1 US20160066181A1 US14/471,332 US201414471332A US2016066181A1 US 20160066181 A1 US20160066181 A1 US 20160066181A1 US 201414471332 A US201414471332 A US 201414471332A US 2016066181 A1 US2016066181 A1 US 2016066181A1
- Authority
- US
- United States
- Prior art keywords
- service
- access point
- message
- reply
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H04L67/20—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/50—Secure pairing of devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/50—Service provisioning or reconfiguring
-
- H04W76/023—
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present disclosure relates to providing third party services to wireless devices and their users.
- Peer to Peer (P2P) wireless connections such as Wi-Fi® Direct
- Wi-Fi® Direct allow two devices to communicate with each other without requiring coordination or even existence of a wireless network infrastructure. In some networks, this type of P2P communication may be a security hazard.
- One of the peer devices may be a valid client on a wireless infrastructure network, and may be configured as a packet forwarder (e.g., bridge or router).
- the Wi-Fi Direct specification refers to packet forwarding between the Wi-Fi Direct connection and the wireless infrastructure as a “cross connection.”
- the Wi-Fi Direct specification includes a mechanism by which the wireless infrastructure may forbid cross connection, but strict implementation of this feature is not predictable.
- the peer device may alternate between a secure infrastructure connection and a P2P connection, fully compliant with a restriction on the cross connection feature, while still functionally allowing packet forwarding.
- FIG. 1 is a block diagram of a system of a wireless network access point configured to control and enhancing services between two wireless devices according to an example embodiment.
- FIG. 2 is a block diagram of an access point configured to control P2P wireless connections according to an example embodiment.
- FIGS. 3-5 are simplified block diagrams of at least one access point enhancing a presentation service according to an example embodiment.
- FIGS. 6 and 7 are simplified block diagrams of an access point controlling P2P wireless connections according to an example embodiment.
- FIGS. 8A and 8B are flowcharts depicting operations of an access point in controlling and enhancing P2P services according to an example embodiment.
- FIG. 9 is a flowchart depicting operations of an access point in blocking prohibited P2P connections according to an example embodiment.
- the techniques presented herein provide for a method for an access point to control peer-to-peer wireless transmission in an area around the access point.
- the access point receives a first message from a first device advertising a service.
- the access point determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access point blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
- networks with high security and strict monitoring requirements e.g., banks, government offices, etc.
- direct communication to and from devices may not be allowed.
- the network administrators may want to block all wireless communications that do not traverse the infrastructure for monitoring and control. Uncontrolled wireless communication may use bandwidth that is otherwise allocated for an access point and its clients' communications. Additionally, direct communication between corporate and non-corporate devices may be blocked for security purposes.
- uncontrolled direct communication between devices may not be efficient.
- BYOD Your Own Device
- the display device may not be physically close enough to the presenting client device to ensure a consistent direct connection.
- the instructor may be allowed to project their BYOD screen to a display device, but students with the same type of BYOD may not be allowed to display content on that device.
- the solutions presented herein allow a network administrator to control wireless P2P communication in environments that may require strict control.
- the P2P communication is controlled through containment (e.g., forcing P2P communication attempts to fail).
- the P2P communication is controlled through cooperation (e.g., relaying/forwarding traffic through the wireless infrastructure, where Quality of Service (QoS), security, and range policies may be applied).
- QoS Quality of Service
- a system 100 comprising a service providing device 110 that wirelessly advertises a service, a service using device 120 that is able to use the service, and a wireless access point 130 that is configured to provide access to an infrastructure connection to network 140 .
- the service providing device 110 advertises a service that the service using device 120 accepts in order to create a direct, peer-to-peer wireless link between the two devices.
- a service providing device 110 may be an accessory to a computing device, such as a user input device (e.g., keyboard, mouse, etc.), a user output device (e.g., video monitor, audio speakers, printer, etc.), or a data input/output device (e.g., external disk drive, optical disc player/recorder, etc.).
- the service using device 120 may be the computing device (e.g., desktop computer, laptop computer, mobile/cellular phone, tablet computer, etc.) that uses the accessory.
- the service providing device 110 is a wirelessly enabled monitor that may advertise its functions as a service
- the service using device 120 is a computer that accepts the advertised service as a way of connecting the computer to a monitor.
- the roles of advertising the service and accepting the service may be reversed, and the service providing device 110 is a computer that may advertise its output of video data as a service, and the service using device 120 is a monitor that accepts the service to display the video data.
- Wireless access point 130 provides wireless access to a wired network infrastructure 140 .
- the wired network infrastructure (“network”) 140 may include or connect to further networks, e.g., any combination of Internet, intranet, local area networks (LANs), and/or wide area networks (WANs).
- multiple access points may be used to provide wireless access to the network 140 .
- Access point 130 includes, among other possible components, a processor 210 to process instructions relevant to control a service, and a memory 220 to store a variety of data and software instructions (e.g., access point control logic 225 ).
- the access point 130 includes a network interface module 230 to communicate with network 140 .
- the access point 130 also includes a wireless network interface module 240 to communicate with service providing device 110 and service using device 120 , such as in accordance with a Wi-Fi certified implementation of the 802.11 communication standard.
- portions of network interface module 230 may also be used in wireless network interface module 240 to perform network operations common to wired and wireless networks.
- Memory 220 may comprise read only memory (ROM), random access memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible (e.g., non-transitory) memory storage devices.
- the processor 210 is, for example, a microprocessor or microcontroller that executes instructions for implementing the processes described herein.
- the memory 220 may comprise one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the processor 210 ) it is operable to perform the operations described herein.
- the access point 130 may block wireless P2P connections within its range by confusing one or both of the devices 110 and 120 with ambiguous or contradictory messages.
- the access point 130 may replay the frame using the media access control (MAC) address of the service providing device 110 , but with a setting that is not allowed by a standard.
- MAC media access control
- the access point 130 may replay a Wi-Fi Direct frame, but in such a manner so as to only describe 802.11b rates in the supported rates frames capability fields.
- a Wi-Fi Direct connection cannot communicate at 802.11b rates and should not mention any 802.11b rate in their capability fields. Because the access point 130 spoofs the MAC address of the service providing device 110 , the service using device 120 should refuse to pair with the offending MAC address, even if the service providing device 110 keeps sending valid information in its capabilities field.
- the access point may replay the initiation frame sent by device 110 , but with an invalid P2P Information Element (IE) field (e.g., incorrect version number, incorrect Wi-Fi Alliance (WFA) organizationally unique identifier (OUI)), or an invalid P2P capability attribute value (e.g., P2P device discovery set to “unsupported,” P2P device limit set to 1, P2P Group Owner (GO) set to 0, P2P group limit set to 1, group formation set to 1 with GO set to 0).
- IE P2P Information Element
- WFA Wi-Fi Alliance
- UAI organizationally unique identifier
- P2P capability attribute value e.g., P2P device discovery set to “unsupported,” P2P device limit set to 1, P2P Group Owner (GO) set to 0, P2P group limit set to 1, group formation set to 1 with GO set to 0.
- the access point 130 may inhibit wireless P2P connections with classical, i.e., non-ambiguous, legitimate, frames to force the P2P connection to fail.
- Wi-Fi Direct as an example, devices 110 and 120 discover each other through probe requests and responses.
- a Wi-Fi Direct GO may also send beacons.
- An access point 130 may block Wi-Fi Direct communication by spoofing the MAC address of the device 110 (acting as a GO), and sending a de-authentication or disassociation frame to each Wi-Fi Direct client, e.g., device 120 , performing an authentication or association request.
- the access point 130 may also use an “authentication rejected” frame.
- the access point 130 may spoof the GO MAC address and reply with a group limit set to 1, marking that the GO does not accept any additional connections.
- the access point 130 may respond with a GO Negotiation Response frame that includes the Status attribute with the Status Code field set to “Fail; unable to accommodate request.”
- the access point 130 may cause the connection to fail by sending an Extensible Authentication Protocol (EAP) Failure message during the connection setup.
- EAP Extensible Authentication Protocol
- the access point 130 may send a frame also announcing the access point 130 as a registrar in active PBC mode.
- the access point 130 does not need to spoof the MAC address of the service providing device 110 , because the service using device 120 should abort the connection when detecting more than one registrar in active PBC mode.
- the access point 130 may send a frame also announcing the access point 130 as an enrollee in active PBC mode.
- the access point 130 may force service providing device 110 and service using device 120 to communicate through the access point infrastructure.
- This allows the infrastructure connected through network 140 to better manage communications control, granular quality of service (QoS), or extend the range of the P2P communication.
- QoS quality of service
- a network administrator may, in advance, select specific devices and/or services that should be forced to communicate through the infrastructure. Additionally, the system administrator may select devices and/or services that should be ignored (i.e., allowed to communicate via direct P2P), or completely blocked. This selection may be done on the access point 130 or other infrastructure by listing the known device types and/or service types listed by the WFA P2P specification.
- the access point 130 may identify and list the device and/or the service. Devices and services may be categorized based on the system administrator's choice to let the P2P connection occur for one category, to force the P2P connection through the infrastructure for another category, or to block the P2P for yet another category. Similarly, when service using device 120 is detected by the access point 130 as entering the scan or discovery phase, the service using device 120 may be matched against the configured categories for device types. The access point 130 may then use blocking techniques as described above for devices and/or services belonging to a category that is listed to be blocked.
- the access point 130 may allow the P2P connection to continue for devices and/or services belonging to a category that is listed to be ignored.
- the access point 130 may also redirect the P2P connection through the network infrastructure for devices and/or services belonging to a category that is listed to be redirected.
- a presenter 310 displays a presentation to audience 315 .
- the presentation is stored on device 120 (e.g., a laptop computer), and is displayed on device 110 .
- device 120 may attempt to make a direct P2P connection to device 110 through path 320 .
- the path 320 may be unreliable and a direct P2P connection between device 120 and device 110 may be unlikely or even impossible to maintain.
- Access point 130 assists the P2P connection by relaying the messages in the P2P connection as an intermediary.
- Path 330 between the device 120 and the access point 130
- path 335 between the access point 130 and device 110
- the access point 130 may be positioned (e.g., on the ceiling of the conference room) such that paths 330 and 335 avoid potential interference that may be present in path 320 traversing closer to the audience 315 .
- the access point may discourage any attempt to form a direct connection along path 320 , since that path may become unreliable, leading to a poor user experience.
- FIG. 4 an example is shown of a system 400 that uses access points to multicast a presentation seamlessly to audiences in different rooms through multiple displays.
- two rooms 410 A and 410 B are serviced by access point 130 A and 130 B, respectively.
- Rooms 410 A and 410 B have a display 110 A and 110 B, respectively, to display a presentation to the audience in each room.
- the device 120 of the presenter may attempt to pair with a display device through access point 130 A, as shown at path 430 A.
- the access point 130 A relays the display data along path 435 A to display device 110 A, allowing device 110 A to display the presentation to the audience in room 410 A.
- the access point 130 A also forwards the display data along network 140 to access point 130 B.
- the access point 130 B relays the display data along path 435 B to display device 110 B, allowing device 110 B to display the presentation to the audience in room 410 B.
- the decision to forward display data from access point 130 A to access point 130 B may be set before the device 120 connects to the access point 130 A.
- the presenter may select specific access points (and specific displays in specific conference rooms) to forward the presentation data. In one example, the presenter selects the displays as part of the initial P2P negotiation.
- FIG. 5 an example is shown of a system 500 that uses access points to allow presenters in different rooms to connect to appropriate display devices.
- two rooms 510 A and 510 B are serviced by access points 130 A and 130 B, respectively.
- Rooms 510 A and 510 B have a display device 110 A and 110 B respectively, to display a presentation to the audience in each room.
- Each room has a different presenter that wants to display data on the display in their respective room.
- device 120 A of a presenter in room 510 A may be physically closer to display device 110 B in room 510 B than it is to display device 110 A in room 510 A.
- the access points in each room regulate any P2P connections that are attempted in the conference rooms.
- the device 120 A serving as a presenter device, searches for a device offering a display service.
- the access point 130 A advertises those services which are available from room 510 A, including the display service available from display device 110 A.
- the access point 130 A also attempts to restrict the presenter device 120 A from connecting directly with display device 110 B in room 510 B.
- the presenter device 120 A is then able to connect to the display device 110 A through access point 130 A via paths 530 A and 530 B.
- the presenter device 120 B in room 510 B is able to connect to the display 110 B through access point 130 B via paths 530 B and 535 B.
- display devices 110 A and 110 B may be configured to advertise their P2P services through a manufacturer directed name, such as “LG1234,” and the actual display may not be immediately apparent to a presenter in the room. Since displays in adjacent rooms may advertise using the same or similar names, the access points 130 A and 130 B provide P2P advertisement messages that offer names that a presenter can recognize as the appropriate display. In one example, the access point 130 A may advertise the display service of display device 110 A by referring to the room number of room 510 A, that the presenter would presumably recognize. This allows the presenter to have some assurance that the display that the presenter's device is sending the presentation data to is the appropriate display.
- a manufacturer directed name such as “LG1234”
- FIG. 6 an example is shown of a system 600 that uses an access point to limit interfering P2P wireless connections in a dense user environment.
- users at user stations 610 A- 610 M connect to the network infrastructure via access point 130 .
- One user at user station 610 M also has a personal device 620 that is configured to allow direct P2P connections.
- the user at user station 610 J has a personal device 630 that is configured to allow direct P2P connections.
- the devices 620 and 630 are allowed to set up a direct P2P connection with each other (e.g., device 620 offers a service that device 630 accepts), then the infrastructure network connection for nearby user stations 610 J, 601 K, 610 L, and 610 M may encounter interference. Since the wireless P2P connection between device 620 and device 630 may share the same spectrum with the infrastructure connection for the user stations, the infrastructure connection may be degraded by the P2P connection. To preserve the infrastructure connection for all of the user stations, the access point 130 will control the direct P2P connections in the dense environment, and may cause the direct P2P connection to fail, as described above.
- user stations 710 A- 710 M may include a computer and peripherals (e.g., keyboard, mouse, monitor, etc.), with at least some of the peripherals communicating with the computer via direct P2P connections.
- a user may bring their own device (e.g., laptop computer) and connect to the peripherals via P2P wireless connections.
- a user 720 may check with an administrator 730 when the user 720 would like to work at a user station.
- the administrator 730 assigns the user to an unoccupied user station (e.g., user station 710 F).
- the administrator's computer 740 communicates through network 140 to the access point 130 , and authorizes P2P connections between any device that the user 720 brought and the computer and/or peripherals in user station 710 F.
- a user at user station 710 A may inadvertently or deliberately connect their device to a nearby user station 710 B.
- the access point strictly controls any P2P connections of the peripherals in user station 710 A to other peripherals and/or the computer in user station 710 A.
- the access point 130 may allow a direct P2P connection between the peripherals in user station 710 A and a user device brought by a user that is authorized by the administrator 730 to work at user station 710 A.
- a process 800 is shown of an example of operations to control the wireless P2P connections in the range of an access point.
- an administrator may configure, in step 810 , one or more lists 815 of devices and/or services that are allowed to make direct P2P wireless connections, should be prevented from making direct P2P wireless connections, or are designated to have their P2P wireless connections redirected through the network infrastructure.
- the system may also set up PBC authentication credentials in step 810 to allow the access point to act as a client for services that use PBC authentication.
- the system listens to wireless frames (e.g., beacons, probe responses) containing P2P Information Elements (IEs) to identify devices. Any device found in step 820 is compared to the list of devices 815 to determine if/how the device is classified in step 822 . If the device is categorized as a device that should be restricted from any P2P wireless connections, then the access point attempts to block the device in step 824 . If the device is categorized as a device that is allowed to form P2P wireless connections, then the access point ignores the device in step 826 , and allows the P2P wireless connection to proceed.
- wireless frames e.g., beacons, probe responses
- IEs P2P Information Elements
- the access points continues the process at point 828 , further described below with respect to FIG. 8B . If the device is not categorized in any specific category, then the system does not take any specific action based on identifying the device, and proceeds to determine the service that the device may subscribe to. Alternatively, the system may attempt to block any device that is not categorized in any specific category.
- the system also listens to the wireless frames containing a P2P IE to identify services that are being offered in step 830 . Any service found in step 830 is compared to the list of services 815 to determine if/how the service is classified in step 832 . If the service is categorized as a type of service that is prohibited, then the access point attempts to block P2P communications of devices using the service at step 824 . If the service is either specifically allowed or not specifically categorized, then the access point ignores the service at step 826 and allows the service to be provided over a P2P wireless connection. Alternatively, services that are not specifically categorized may be restricted by default, and the system will attempt to block any service that is not categorized. If the service is categorized as a service that should be redirected through the network infrastructure, then the access point continues the process at point 828 , further described below with respect to FIG. 8B .
- the process 800 continues in which either a device or a service has been detected that is categorized as a device or service that should be redirected through the network infrastructure.
- the access point that is local to the device determines whether the service being requested is detected within range of that access point. If the service is not detected at the access point local to the device requesting the service, then the system determines, at step 845 , whether the service is being advertised at any other access point that is connected to the local access point. If the service is not being offered at any accessible access point, then the system ignores the device at step 826 , since the device is not able to establish a P2P connection since the service is unavailable.
- the local access point begins to broadcast the P2P Service Set Identifier (SSID) associated with the type of P2P wireless connection.
- SSID P2P Service Set Identifier
- the access point that is local to the service providing device attempts to authenticate and associate with the service providing device, and determines which, if any, authentication mechanism is needed by the device offering the service.
- the access point offers the service to the device that is requesting the service in step 870 .
- the system uses Man in the Middle (MITM) logic to forward the request to the device and capture the PIN response from the device in step 882 .
- the authentication method is PBC authentication, as determined in step 880 , then the system uses a previously generated PBC credential to authenticate the access point to the service providing device, while using a virtual PBC to create credentials for the device requesting the service. After the access point has successfully authenticated itself to both the service providing device and the service using device, the access point relays the P2P wireless connection traffic between the service providing device and the client on the service using device in step 890 .
- the local access point would announce itself as a GO of a persistent group, according to the Wi-Fi Direct protocol.
- the local access point offers the service requested by the client device and previously reported as offered by another Wi-Fi Direct device.
- the access point may also use the invitation procedure to attract the Wi-Fi Direct client. This may be noted herein as a “dual citizenship” procedure, since the access point is both a client to the service providing device and a source to the service using device.
- Wi-Fi Direct communication between the Wi-Fi Direct client and any other (non-access-point) Wi-Fi Direct device replying to the Wi-Fi Direct client may still be prevented, e.g., using one of the containment techniques described above.
- the access point would also join the Wi-Fi Direct device offering the service, as an emulated client device.
- the access point associating with service providing device may be different from the access point associated with the service using client device.
- the access point would attempt to make any direct P2P connections fail. This may be achieved by operating in several phases, as described below.
- the infrastructure detects two P2P devices trying to pair. One device is the registrar and the other device is the enrollee.
- the infrastructure prevents the enrollee from registering by attempting to block the P2P connection, as described above.
- the access point registers as an enrollee to the device operating as the Wi-Fi Direct registrar.
- the access point announces itself as a Wi-Fi Direct GO for the service offered by the original registrar, and lets the original enrollee join.
- the access point may announce itself as a GO as soon as the enrollee device is detected.
- the access point would be a client to the original registrar, and the registrar for the original enrollee, thus obtaining a “dual citizenship” status.
- the access point would relay traffic between the original registrar and the original enrollee, and may route the traffic through a controller for QoS or security control, or to extend the range between the original enrollee and the original registrar.
- PIN authentication may require a user to enter a PIN of the client device that requests access to the service.
- This PIN may be statically defined (e.g., for headless/screenless devices) or dynamically generated for each connection and each session.
- the access point may attempt to block the direct P2P connections, as described above, allowing the system to maintain containment of the P2P connections or manually registering the device. Manually registering the device may require the device PIN to be entered into a controller interface.
- a checkbox may be provided to allow an administrator to specify if the PIN is static or dynamic.
- the access point may enroll with a Wi-Fi Direct device requiring a PIN input from a peer by using a PIN generated by the access point. This enrollment may be done as part of a pre-staging phase, or at the time when a connection to the service using device is needed.
- the access point may disconnect if the PIN is a static PIN.
- the PIN may be saved, and the AP may re-enroll whenever needed to re-acquire the “dual citizenship.”
- the access point would maintain the session so that a new PIN is not generated.
- the session may be maintained by sending a “keepalive” message, such as an Address Resolution Protocol (ARP) request to learn the registrar's IP address, followed by a periodic “ping” every 100 seconds.
- ARP Address Resolution Protocol
- any other periodic message or timer value may be used to maintain the session with the same PIN.
- the access point may attempt to block the direct P2P connection, as described above, and would then use a relay method similar to that of the PBC authentication method described above.
- the access point receives a message from a first device advertising a service that the first device is able to provide.
- the access point also receives a message from a second device requesting the service in step 920 . If the second device is prohibited from making P2P wireless connections, as determined in step 930 , then the access point attempts to block the second device from receiving the service at step 935 . If the service offered by the first device is prohibited, as determined in step 940 , then the access point attempts to block the first device from providing the service over a P2P wireless connection.
- the access point allows the first device and the second device to set up a P2P connection in step 950 , and the service is provided to the second device by the first device.
- the techniques presented herein provide for blocking P2P wireless connections (e.g., Wi-Fi Direct) in controlled environments where P2P wireless connections may not be welcome.
- the techniques further provide for selectively allowing communication between P2P devices, based on the types of devices or the offered services.
- the P2P connection traffic may also be relayed through the wireless infrastructure, extending the range of the communication, and applying any security and/or QoS policies decided by a network administrator.
- the techniques presented herein provide for a method for an access point to receive a first message from a first device advertising a service.
- the access point receives a second message from a second device requesting the service.
- the access point determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access point blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
- an apparatus comprising a network interface unit, a wireless transceiver, and a processor coupled to the network interface unit and the wireless transceiver.
- the network interface unit enables communications over a network.
- the wireless transceiver receives a first message from a first device advertising a service, and receives a second message from a second device requesting the service.
- the processor determines whether the second device or the service is prohibited in an area controlled by the apparatus. Responsive to a determination that the second device is prohibited, the processor blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the processor blocks the first device from providing the service.
- a system comprising a first device, a second device, and an access point.
- the first device offers a service in a first wireless message.
- the second device requests the service in a second wireless message.
- the access point receives the first wireless message and the second wireless message, and determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access points blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
An access point is configured to control peer-to-peer wireless transmission in an area around the access point. The access point receives a message from a service providing device advertising a service. The access point receives another message from a service using device requesting the service. The access point determines whether the service using device or the service is prohibited in the area controlled by the access point. Responsive to a determination that the service using device is prohibited, the access point blocks the service using device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the service providing device from providing the service.
Description
- The present disclosure relates to providing third party services to wireless devices and their users.
- Peer to Peer (P2P) wireless connections, such as Wi-Fi® Direct, allow two devices to communicate with each other without requiring coordination or even existence of a wireless network infrastructure. In some networks, this type of P2P communication may be a security hazard. One of the peer devices may be a valid client on a wireless infrastructure network, and may be configured as a packet forwarder (e.g., bridge or router). The Wi-Fi Direct specification refers to packet forwarding between the Wi-Fi Direct connection and the wireless infrastructure as a “cross connection.” The Wi-Fi Direct specification includes a mechanism by which the wireless infrastructure may forbid cross connection, but strict implementation of this feature is not predictable. For example, the peer device may alternate between a secure infrastructure connection and a P2P connection, fully compliant with a restriction on the cross connection feature, while still functionally allowing packet forwarding.
-
FIG. 1 is a block diagram of a system of a wireless network access point configured to control and enhancing services between two wireless devices according to an example embodiment. -
FIG. 2 is a block diagram of an access point configured to control P2P wireless connections according to an example embodiment. -
FIGS. 3-5 are simplified block diagrams of at least one access point enhancing a presentation service according to an example embodiment. -
FIGS. 6 and 7 are simplified block diagrams of an access point controlling P2P wireless connections according to an example embodiment. -
FIGS. 8A and 8B are flowcharts depicting operations of an access point in controlling and enhancing P2P services according to an example embodiment. -
FIG. 9 is a flowchart depicting operations of an access point in blocking prohibited P2P connections according to an example embodiment. - The techniques presented herein provide for a method for an access point to control peer-to-peer wireless transmission in an area around the access point. The access point receives a first message from a first device advertising a service. The access point receives a second message from a second device requesting the service. The access point determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access point blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
- In some networks with high security and strict monitoring requirements (e.g., banks, government offices, etc.) direct communication to and from devices may not be allowed. The network administrators may want to block all wireless communications that do not traverse the infrastructure for monitoring and control. Uncontrolled wireless communication may use bandwidth that is otherwise allocated for an access point and its clients' communications. Additionally, direct communication between corporate and non-corporate devices may be blocked for security purposes.
- In other networks, uncontrolled direct communication between devices may not be efficient. For example, in public conference facilities, one Bring Your Own Device (BYOD) may need to display/share content across several screens at the same time, sometimes in different rooms. In larger conference facilities, the display device may not be physically close enough to the presenting client device to ensure a consistent direct connection. In another example, in a classroom environment, the instructor may be allowed to project their BYOD screen to a display device, but students with the same type of BYOD may not be allowed to display content on that device.
- The solutions presented herein allow a network administrator to control wireless P2P communication in environments that may require strict control. In one example, the P2P communication is controlled through containment (e.g., forcing P2P communication attempts to fail). In another example, the P2P communication is controlled through cooperation (e.g., relaying/forwarding traffic through the wireless infrastructure, where Quality of Service (QoS), security, and range policies may be applied).
- Referring to
FIG. 1 , asystem 100 is shown comprising aservice providing device 110 that wirelessly advertises a service, aservice using device 120 that is able to use the service, and awireless access point 130 that is configured to provide access to an infrastructure connection tonetwork 140. In general, theservice providing device 110 advertises a service that theservice using device 120 accepts in order to create a direct, peer-to-peer wireless link between the two devices. - In one example, a
service providing device 110 may be an accessory to a computing device, such as a user input device (e.g., keyboard, mouse, etc.), a user output device (e.g., video monitor, audio speakers, printer, etc.), or a data input/output device (e.g., external disk drive, optical disc player/recorder, etc.). In this example, theservice using device 120 may be the computing device (e.g., desktop computer, laptop computer, mobile/cellular phone, tablet computer, etc.) that uses the accessory. In other words, theservice providing device 110 is a wirelessly enabled monitor that may advertise its functions as a service, and theservice using device 120 is a computer that accepts the advertised service as a way of connecting the computer to a monitor. Alternatively, the roles of advertising the service and accepting the service may be reversed, and theservice providing device 110 is a computer that may advertise its output of video data as a service, and theservice using device 120 is a monitor that accepts the service to display the video data. -
Wireless access point 130 provides wireless access to awired network infrastructure 140. In one example, the wired network infrastructure (“network”) 140 may include or connect to further networks, e.g., any combination of Internet, intranet, local area networks (LANs), and/or wide area networks (WANs). In another example, multiple access points may be used to provide wireless access to thenetwork 140. - Referring now to
FIG. 2 , a simplified block diagram is shown of anaccess point 130 configured to augment and control services according to the techniques presented herein.Access point 130 includes, among other possible components, aprocessor 210 to process instructions relevant to control a service, and amemory 220 to store a variety of data and software instructions (e.g., access point control logic 225). Theaccess point 130 includes anetwork interface module 230 to communicate withnetwork 140. Theaccess point 130 also includes a wirelessnetwork interface module 240 to communicate withservice providing device 110 andservice using device 120, such as in accordance with a Wi-Fi certified implementation of the 802.11 communication standard. In one example, portions ofnetwork interface module 230 may also be used in wirelessnetwork interface module 240 to perform network operations common to wired and wireless networks. -
Memory 220 may comprise read only memory (ROM), random access memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible (e.g., non-transitory) memory storage devices. Theprocessor 210 is, for example, a microprocessor or microcontroller that executes instructions for implementing the processes described herein. Thus, in general, thememory 220 may comprise one or more tangible (non-transitory) computer readable storage media (e.g., a memory device) encoded with software comprising computer executable instructions and when the software is executed (by the processor 210) it is operable to perform the operations described herein. - The
access point 130 may block wireless P2P connections within its range by confusing one or both of thedevices access point 130 detects a P2P initiation frame (e.g., probe response, beacon, etc.) from theservice providing device 110, theaccess point 130 may replay the frame using the media access control (MAC) address of theservice providing device 110, but with a setting that is not allowed by a standard. For example, theaccess point 130 may replay a Wi-Fi Direct frame, but in such a manner so as to only describe 802.11b rates in the supported rates frames capability fields. Per the P2P v.1.2 specification, a Wi-Fi Direct connection cannot communicate at 802.11b rates and should not mention any 802.11b rate in their capability fields. Because theaccess point 130 spoofs the MAC address of theservice providing device 110, theservice using device 120 should refuse to pair with the offending MAC address, even if theservice providing device 110 keeps sending valid information in its capabilities field. - Similarly, the access point may replay the initiation frame sent by
device 110, but with an invalid P2P Information Element (IE) field (e.g., incorrect version number, incorrect Wi-Fi Alliance (WFA) organizationally unique identifier (OUI)), or an invalid P2P capability attribute value (e.g., P2P device discovery set to “unsupported,” P2P device limit set to 1, P2P Group Owner (GO) set to 0, P2P group limit set to 1, group formation set to 1 with GO set to 0). Any of these techniques create ambiguity and therefore unreliability, such that a Wi-Fi Direct connection cannot be formed with a high degree of confidence. - Alternatively, the
access point 130 may inhibit wireless P2P connections with classical, i.e., non-ambiguous, legitimate, frames to force the P2P connection to fail. Using Wi-Fi Direct as an example,devices access point 130 may block Wi-Fi Direct communication by spoofing the MAC address of the device 110 (acting as a GO), and sending a de-authentication or disassociation frame to each Wi-Fi Direct client, e.g.,device 120, performing an authentication or association request. In an example in which theaccess point 130 begins inhibiting the P2P connection during the initial connection establishment phase, theaccess point 130 may also use an “authentication rejected” frame. In another example, theaccess point 130 may spoof the GO MAC address and reply with a group limit set to 1, marking that the GO does not accept any additional connections. In yet another example, theaccess point 130 may respond with a GO Negotiation Response frame that includes the Status attribute with the Status Code field set to “Fail; unable to accommodate request.” In still a further example, theaccess point 130 may cause the connection to fail by sending an Extensible Authentication Protocol (EAP) Failure message during the connection setup. - In one example, upon detecting
service providing device 110 trying to connect withservice using device 120 by announcing itself as a registrar in active Push Button Connection (PBC) mode, theaccess point 130 may send a frame also announcing theaccess point 130 as a registrar in active PBC mode. In this example, theaccess point 130 does not need to spoof the MAC address of theservice providing device 110, because theservice using device 120 should abort the connection when detecting more than one registrar in active PBC mode. Similarly, upon detecting theservice using device 120 trying to connect with theservice providing device 110 by announcing itself as an enrollee in active PBC mode, theaccess point 130 may send a frame also announcing theaccess point 130 as an enrollee in active PBC mode. - In another example, the
access point 130 may forceservice providing device 110 andservice using device 120 to communicate through the access point infrastructure. This allows the infrastructure connected throughnetwork 140 to better manage communications control, granular quality of service (QoS), or extend the range of the P2P communication. A network administrator may, in advance, select specific devices and/or services that should be forced to communicate through the infrastructure. Additionally, the system administrator may select devices and/or services that should be ignored (i.e., allowed to communicate via direct P2P), or completely blocked. This selection may be done on theaccess point 130 or other infrastructure by listing the known device types and/or service types listed by the WFA P2P specification. - When
service providing device 110 announces its service (e.g., via probe responses or beacons), theaccess point 130 may identify and list the device and/or the service. Devices and services may be categorized based on the system administrator's choice to let the P2P connection occur for one category, to force the P2P connection through the infrastructure for another category, or to block the P2P for yet another category. Similarly, whenservice using device 120 is detected by theaccess point 130 as entering the scan or discovery phase, theservice using device 120 may be matched against the configured categories for device types. Theaccess point 130 may then use blocking techniques as described above for devices and/or services belonging to a category that is listed to be blocked. Theaccess point 130 may allow the P2P connection to continue for devices and/or services belonging to a category that is listed to be ignored. Theaccess point 130 may also redirect the P2P connection through the network infrastructure for devices and/or services belonging to a category that is listed to be redirected. - Referring now to
FIG. 3 , an example is shown of asystem 300 that uses an access point to extend the range of a P2P connection in a conference room environment. In this example, apresenter 310 displays a presentation toaudience 315. The presentation is stored on device 120 (e.g., a laptop computer), and is displayed ondevice 110. Initially,device 120 may attempt to make a direct P2P connection todevice 110 throughpath 320. However, in some circumstances, such as a presenter in the rear of a large conference room, thepath 320 may be unreliable and a direct P2P connection betweendevice 120 anddevice 110 may be unlikely or even impossible to maintain. -
Access point 130 assists the P2P connection by relaying the messages in the P2P connection as an intermediary.Path 330, between thedevice 120 and theaccess point 130, andpath 335, between theaccess point 130 anddevice 110, can each be shorter and more reliable than the longer,direct path 320. Additionally, theaccess point 130 may be positioned (e.g., on the ceiling of the conference room) such thatpaths path 320 traversing closer to theaudience 315. In one example, the access point may discourage any attempt to form a direct connection alongpath 320, since that path may become unreliable, leading to a poor user experience. - Referring now to
FIG. 4 , an example is shown of asystem 400 that uses access points to multicast a presentation seamlessly to audiences in different rooms through multiple displays. In this example, tworooms access point Rooms display device 120 of the presenter may attempt to pair with a display device throughaccess point 130A, as shown atpath 430A. Theaccess point 130A relays the display data alongpath 435A to displaydevice 110A, allowingdevice 110A to display the presentation to the audience inroom 410A. Theaccess point 130A also forwards the display data alongnetwork 140 to accesspoint 130B. Theaccess point 130B relays the display data alongpath 435B to displaydevice 110B, allowingdevice 110B to display the presentation to the audience inroom 410B. In one example, the decision to forward display data fromaccess point 130A to accesspoint 130B may be set before thedevice 120 connects to theaccess point 130A. Alternatively, the presenter may select specific access points (and specific displays in specific conference rooms) to forward the presentation data. In one example, the presenter selects the displays as part of the initial P2P negotiation. - Referring now to
FIG. 5 , an example is shown of asystem 500 that uses access points to allow presenters in different rooms to connect to appropriate display devices. In this example, tworooms access points Rooms display device rooms device 120A of a presenter inroom 510A may be physically closer to displaydevice 110B inroom 510B than it is to displaydevice 110A inroom 510A. However, since the presenter wants to display the presentation in the same room that he or she is in, the access points in each room regulate any P2P connections that are attempted in the conference rooms. - In this example, the
device 120A, serving as a presenter device, searches for a device offering a display service. Theaccess point 130A advertises those services which are available fromroom 510A, including the display service available fromdisplay device 110A. Theaccess point 130A also attempts to restrict thepresenter device 120A from connecting directly withdisplay device 110B inroom 510B. Thepresenter device 120A is then able to connect to thedisplay device 110A throughaccess point 130A viapaths presenter device 120B inroom 510B is able to connect to thedisplay 110B throughaccess point 130B viapaths - In one example,
display devices access points access point 130A may advertise the display service ofdisplay device 110A by referring to the room number ofroom 510A, that the presenter would presumably recognize. This allows the presenter to have some assurance that the display that the presenter's device is sending the presentation data to is the appropriate display. - Referring now to
FIG. 6 , an example is shown of asystem 600 that uses an access point to limit interfering P2P wireless connections in a dense user environment. In this example, users atuser stations 610A-610M connect to the network infrastructure viaaccess point 130. One user atuser station 610M also has a personal device 620 that is configured to allow direct P2P connections. Similarly, the user atuser station 610J has apersonal device 630 that is configured to allow direct P2P connections. However, if thedevices 620 and 630 are allowed to set up a direct P2P connection with each other (e.g., device 620 offers a service thatdevice 630 accepts), then the infrastructure network connection fornearby user stations device 630 may share the same spectrum with the infrastructure connection for the user stations, the infrastructure connection may be degraded by the P2P connection. To preserve the infrastructure connection for all of the user stations, theaccess point 130 will control the direct P2P connections in the dense environment, and may cause the direct P2P connection to fail, as described above. - Referring now to
FIG. 7 , an example is shown of asystem 700 that uses an access point to control P2P connections in user stations of a dense user environment. In one example,user stations 710A-710M may include a computer and peripherals (e.g., keyboard, mouse, monitor, etc.), with at least some of the peripherals communicating with the computer via direct P2P connections. In another example, a user may bring their own device (e.g., laptop computer) and connect to the peripherals via P2P wireless connections. Additionally, auser 720 may check with anadministrator 730 when theuser 720 would like to work at a user station. Theadministrator 730 assigns the user to an unoccupied user station (e.g.,user station 710F). The administrator'scomputer 740 communicates throughnetwork 140 to theaccess point 130, and authorizes P2P connections between any device that theuser 720 brought and the computer and/or peripherals inuser station 710F. - In an uncontrolled environment, a user at
user station 710A may inadvertently or deliberately connect their device to anearby user station 710B. To avoid the confusion caused by a user atstation 710A connecting to the wrong peripherals, the access point strictly controls any P2P connections of the peripherals inuser station 710A to other peripherals and/or the computer inuser station 710A. Additionally, theaccess point 130 may allow a direct P2P connection between the peripherals inuser station 710A and a user device brought by a user that is authorized by theadministrator 730 to work atuser station 710A. - Referring now to
FIGS. 8A and 8B , aprocess 800 is shown of an example of operations to control the wireless P2P connections in the range of an access point. From thestart 805 of the process, an administrator may configure, instep 810, one ormore lists 815 of devices and/or services that are allowed to make direct P2P wireless connections, should be prevented from making direct P2P wireless connections, or are designated to have their P2P wireless connections redirected through the network infrastructure. The system may also set up PBC authentication credentials instep 810 to allow the access point to act as a client for services that use PBC authentication. - The system listens to wireless frames (e.g., beacons, probe responses) containing P2P Information Elements (IEs) to identify devices. Any device found in
step 820 is compared to the list ofdevices 815 to determine if/how the device is classified instep 822. If the device is categorized as a device that should be restricted from any P2P wireless connections, then the access point attempts to block the device instep 824. If the device is categorized as a device that is allowed to form P2P wireless connections, then the access point ignores the device instep 826, and allows the P2P wireless connection to proceed. If the device is categorized as a device that should have P2P wireless connections redirected through the network infrastructure, then the access points continues the process atpoint 828, further described below with respect toFIG. 8B . If the device is not categorized in any specific category, then the system does not take any specific action based on identifying the device, and proceeds to determine the service that the device may subscribe to. Alternatively, the system may attempt to block any device that is not categorized in any specific category. - The system also listens to the wireless frames containing a P2P IE to identify services that are being offered in
step 830. Any service found instep 830 is compared to the list ofservices 815 to determine if/how the service is classified instep 832. If the service is categorized as a type of service that is prohibited, then the access point attempts to block P2P communications of devices using the service atstep 824. If the service is either specifically allowed or not specifically categorized, then the access point ignores the service atstep 826 and allows the service to be provided over a P2P wireless connection. Alternatively, services that are not specifically categorized may be restricted by default, and the system will attempt to block any service that is not categorized. If the service is categorized as a service that should be redirected through the network infrastructure, then the access point continues the process atpoint 828, further described below with respect toFIG. 8B . - Referring now to
FIG. 8B , theprocess 800 continues in which either a device or a service has been detected that is categorized as a device or service that should be redirected through the network infrastructure. Instep 840, the access point that is local to the device determines whether the service being requested is detected within range of that access point. If the service is not detected at the access point local to the device requesting the service, then the system determines, atstep 845, whether the service is being advertised at any other access point that is connected to the local access point. If the service is not being offered at any accessible access point, then the system ignores the device atstep 826, since the device is not able to establish a P2P connection since the service is unavailable. - If the service is detected, either at the access point local to the requesting device or at another access point connected to the local access point, then, in
step 850, the local access point begins to broadcast the P2P Service Set Identifier (SSID) associated with the type of P2P wireless connection. Instep 860, the access point that is local to the service providing device attempts to authenticate and associate with the service providing device, and determines which, if any, authentication mechanism is needed by the device offering the service. The access point offers the service to the device that is requesting the service instep 870. In one example, if the authentication method is Personal Identification Number (PIN) authentication, as determined instep 880, then the system uses Man in the Middle (MITM) logic to forward the request to the device and capture the PIN response from the device instep 882. In another example, if the authentication method is PBC authentication, as determined instep 880, then the system uses a previously generated PBC credential to authenticate the access point to the service providing device, while using a virtual PBC to create credentials for the device requesting the service. After the access point has successfully authenticated itself to both the service providing device and the service using device, the access point relays the P2P wireless connection traffic between the service providing device and the client on the service using device instep 890. - In one example, for services that should be forced through the wireless infrastructure, or offered by a device connected to a remote access point, the local access point would announce itself as a GO of a persistent group, according to the Wi-Fi Direct protocol. The local access point offers the service requested by the client device and previously reported as offered by another Wi-Fi Direct device. The access point may also use the invitation procedure to attract the Wi-Fi Direct client. This may be noted herein as a “dual citizenship” procedure, since the access point is both a client to the service providing device and a source to the service using device. Direct communication between the Wi-Fi Direct client and any other (non-access-point) Wi-Fi Direct device replying to the Wi-Fi Direct client may still be prevented, e.g., using one of the containment techniques described above. The access point would also join the Wi-Fi Direct device offering the service, as an emulated client device. In one example, the access point associating with service providing device may be different from the access point associated with the service using client device.
- In another example, for devices offering PBC and offering a Wi-Fi Direct service that is selected to be redirected through the network infrastructure, the access point would attempt to make any direct P2P connections fail. This may be achieved by operating in several phases, as described below. In phase one, the infrastructure detects two P2P devices trying to pair. One device is the registrar and the other device is the enrollee. In phase two, the infrastructure prevents the enrollee from registering by attempting to block the P2P connection, as described above. In phase three, the access point registers as an enrollee to the device operating as the Wi-Fi Direct registrar. In phase 4, the access point announces itself as a Wi-Fi Direct GO for the service offered by the original registrar, and lets the original enrollee join. In another example, the access point may announce itself as a GO as soon as the enrollee device is detected.
- In the above example, the access point would be a client to the original registrar, and the registrar for the original enrollee, thus obtaining a “dual citizenship” status. The access point would relay traffic between the original registrar and the original enrollee, and may route the traffic through a controller for QoS or security control, or to extend the range between the original enrollee and the original registrar.
- In another example, PIN authentication may require a user to enter a PIN of the client device that requests access to the service. This PIN may be statically defined (e.g., for headless/screenless devices) or dynamically generated for each connection and each session. For P2P devices using PIN authentication, the access point may attempt to block the direct P2P connections, as described above, allowing the system to maintain containment of the P2P connections or manually registering the device. Manually registering the device may require the device PIN to be entered into a controller interface. A checkbox may be provided to allow an administrator to specify if the PIN is static or dynamic. The access point may enroll with a Wi-Fi Direct device requiring a PIN input from a peer by using a PIN generated by the access point. This enrollment may be done as part of a pre-staging phase, or at the time when a connection to the service using device is needed.
- If the enrollment is performed during a pre-staging phase, i.e., no Wi-Fi Direct device is attempting to enroll directly to the Wi-Fi Direct device requiring PIN input, the access point may disconnect if the PIN is a static PIN. The PIN may be saved, and the AP may re-enroll whenever needed to re-acquire the “dual citizenship.” For devices that use dynamic PINs, the access point would maintain the session so that a new PIN is not generated. The session may be maintained by sending a “keepalive” message, such as an Address Resolution Protocol (ARP) request to learn the registrar's IP address, followed by a periodic “ping” every 100 seconds. Alternatively, any other periodic message or timer value may be used to maintain the session with the same PIN. When a device tries to pair with the PIN device offering the service, the access point may attempt to block the direct P2P connection, as described above, and would then use a relay method similar to that of the PBC authentication method described above.
- Referring now to
FIG. 9 , aprocess 900 is described for an example of the operations of an access point in controlling P2P connections. Instep 910, the access point receives a message from a first device advertising a service that the first device is able to provide. The access point also receives a message from a second device requesting the service instep 920. If the second device is prohibited from making P2P wireless connections, as determined instep 930, then the access point attempts to block the second device from receiving the service atstep 935. If the service offered by the first device is prohibited, as determined instep 940, then the access point attempts to block the first device from providing the service over a P2P wireless connection. If neither the second device nor the service is prohibited, as determined insteps step 950, and the service is provided to the second device by the first device. - In summary, the techniques presented herein provide for blocking P2P wireless connections (e.g., Wi-Fi Direct) in controlled environments where P2P wireless connections may not be welcome. The techniques further provide for selectively allowing communication between P2P devices, based on the types of devices or the offered services. The P2P connection traffic may also be relayed through the wireless infrastructure, extending the range of the communication, and applying any security and/or QoS policies decided by a network administrator.
- In one example, the techniques presented herein provide for a method for an access point to receive a first message from a first device advertising a service. The access point receives a second message from a second device requesting the service. The access point determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access point blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
- In another example, an apparatus is provided comprising a network interface unit, a wireless transceiver, and a processor coupled to the network interface unit and the wireless transceiver. The network interface unit enables communications over a network. The wireless transceiver receives a first message from a first device advertising a service, and receives a second message from a second device requesting the service. The processor determines whether the second device or the service is prohibited in an area controlled by the apparatus. Responsive to a determination that the second device is prohibited, the processor blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the processor blocks the first device from providing the service.
- In a further example, a system is provided comprising a first device, a second device, and an access point. The first device offers a service in a first wireless message. The second device requests the service in a second wireless message. The access point receives the first wireless message and the second wireless message, and determines whether the second device or the service is prohibited in an area controlled by the access point. Responsive to a determination that the second device is prohibited, the access points blocks the second device from receiving the service. Responsive to a determination that the service is prohibited, the access point blocks the first device from providing the service.
- The above description is intended by way of example only. Various modifications and structural changes may be made therein without departing from the scope of the concepts described herein and within the scope and range of equivalents of the claims.
Claims (20)
1. A method comprising:
receiving at an access point for a wireless network, a first message from a first device advertising a service;
receiving at the access point, a second message from a second device requesting the service;
determining whether the second device or the service is prohibited in an area served by the access point;
responsive to a determination that the second device is prohibited, blocking the second device from receiving the service; and
responsive to a determination that the service is prohibited, blocking the first device from providing the service.
2. The method of claim 1 , further comprising:
determining whether the service is to be served by the access point; and
responsive to a determination that the service is to be served by the access point, responding to the first device with a reply message subscribing to the service, and providing the service to the second device through the access point.
3. The method of claim 2 , further comprising:
receiving from the first device, an authentication request for the service;
transmitting the authentication request to the second device;
receiving from the second device, an authentication reply that indicates an authorization for the service; and
transmitting the authentication reply to the first device.
4. The method of claim 3 , wherein the authentication reply comprises at least one of a push-button control (PBC) credential, or a personal identification number (PIN).
5. The method of claim 1 , wherein the service comprises a peer-to-peer service.
6. The method of claim 1 , wherein blocking the second device from receiving the service comprises sending a reply message to the second device, wherein the reply message causes the second device to ignore the first message from the first device.
7. The method of claim 1 , wherein blocking the first device from providing the service comprises sending a reply message to the first device subscribing to the service, wherein the reply message causes the first device to ignore the second message from the second device.
8. An apparatus comprising:
a network interface unit to enable communications over a network;
a wireless transceiver to:
receive a first message from a first device advertising a service; and
receive a second message from a second device requesting the service; and
a processor coupled to the network interface unit and the wireless transceiver to:
determine whether the second device or the service is prohibited in an area served by the apparatus;
responsive to a determination that the second device is prohibited, block the second device from receiving the service; and
responsive to a determination that the service is prohibited, block the first device from providing the service.
9. The apparatus of claim 9 , wherein the processor is further configured to:
determine whether the service is to be served by the apparatus; and
responsive to a determination that the service is to be served by the apparatus, cause the wireless transceiver to respond to the first device with a reply message subscribing to the service; and
provide the service to the second device through the apparatus.
10. The apparatus of claim 9 , wherein the wireless transceiver is further configured to:
receive from the first device, an authentication request for the service;
transmit the authentication request to the second device;
receive from the second device, an authentication reply that indicates an authorization for the service; and
transmit the authentication reply to the first device.
11. The apparatus of claim 10 , wherein the authentication reply comprises at least one of a push-button control (PBC) credential, or a personal identification number (PIN).
12. The apparatus of claim 8 , wherein the processor blocks the second device from receiving the service by causing the wireless transceiver to send a reply message to the second device, wherein the reply message causes the second device to ignore the first message from the first device.
13. The apparatus of claim 8 , wherein the processor blocks the first device from providing the service by causing the wireless transceiver to send a reply message to the first device subscribing to the service, wherein the reply message causes the first device to ignore the second message from the second device.
14. A system comprising:
a first device offering a service in a first wireless message;
a second device requesting the service in a second wireless message; and
an access point to:
receive the first wireless message and the second wireless message;
determine whether the second device or the service is prohibited in an area controlled by the access point;
responsive to a determination that the second device is prohibited, blocking the second device from receiving the service; and
responsive to a determination that the service is prohibited, blocking the first device from providing the service.
15. The system of claim 14 , wherein the access point further:
determines whether the service is to be served by the access point; and
responsive to a determination that the service is to be served by the access point, responds to the first device with a reply message subscribing to the service; and
provides the service to the second device through the apparatus.
16. The system of claim 15 , wherein the access point further:
receives from the first device, an authentication request for the service;
transmits the authentication request to the second device;
receives from the second device, an authentication reply that indicates an authorization for the service; and
transmits the authentication reply to the first device.
17. The system of claim 16 , wherein the authentication reply comprises at least one of a push-button control (PBC) credential, or a personal identification number (PIN).
18. The system of claim 14 , wherein the service comprises a peer-to-peer service.
19. The system of claim 14 , wherein the access point blocks the second device from receiving the service by sending a reply message to the second device, wherein the reply message causes the second device to ignore the first wireless message from the first device.
20. The system of claim 14 , wherein the access point blocks the first device from providing the service by sending a reply message to the first device subscribing to the service, wherein the reply message causes the first device to ignore the second wireless message from the second device.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/471,332 US9661497B2 (en) | 2014-08-28 | 2014-08-28 | Control and enhancement of direct wireless service communications |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/471,332 US9661497B2 (en) | 2014-08-28 | 2014-08-28 | Control and enhancement of direct wireless service communications |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160066181A1 true US20160066181A1 (en) | 2016-03-03 |
US9661497B2 US9661497B2 (en) | 2017-05-23 |
Family
ID=55404171
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/471,332 Active 2035-02-04 US9661497B2 (en) | 2014-08-28 | 2014-08-28 | Control and enhancement of direct wireless service communications |
Country Status (1)
Country | Link |
---|---|
US (1) | US9661497B2 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190014518A1 (en) * | 2017-07-04 | 2019-01-10 | Canon Kabushiki Kaisha | Communication apparatus, external apparatus, control method for communication apparatus, control method for external apparatus, and non-transitory computer-readable storage medium |
US10908803B1 (en) | 2013-03-15 | 2021-02-02 | Study Social, Inc. | Collaborative, social online education and whiteboard techniques |
US11037675B1 (en) * | 2018-03-05 | 2021-06-15 | Securas Technologies, LLC | Screening-based availability of communications device features |
Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030112789A1 (en) * | 2001-11-01 | 2003-06-19 | Tomi Heinonen | Local service handover |
US20050259611A1 (en) * | 2004-02-11 | 2005-11-24 | Airtight Technologies, Inc. (F/K/A Wibhu Technologies, Inc.) | Automated sniffer apparatus and method for monitoring computer systems for unauthorized access |
US20070266236A1 (en) * | 2006-05-09 | 2007-11-15 | Colditz Nathan Von | Secure network and method of operation |
US7370362B2 (en) * | 2005-03-03 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for locating rogue access point switch ports in a wireless network |
US20080240016A1 (en) * | 2007-03-27 | 2008-10-02 | Yigang Cai | Ims networks providing business-related content to wireless devices |
US20090016529A1 (en) * | 2007-07-11 | 2009-01-15 | Airtight Networks, Inc. | Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols |
US7483984B1 (en) * | 2001-12-19 | 2009-01-27 | Boingo Wireless, Inc. | Method and apparatus for accessing networks by a mobile device |
US20090029691A1 (en) * | 2007-07-25 | 2009-01-29 | Microsoft Corporation | Base station initiated proximity service discovery and connection establishment |
US7558960B2 (en) * | 2003-10-16 | 2009-07-07 | Cisco Technology, Inc. | Network infrastructure validation of network management frames |
US20100070760A1 (en) * | 2008-09-12 | 2010-03-18 | Qualcomm Incorporated | Ticket-based spectrum authorization and access control |
US20100067504A1 (en) * | 2008-09-18 | 2010-03-18 | Alcatel Lucent | System and method for exposing malicious clients in wireless access networks |
US20100088732A1 (en) * | 2008-10-02 | 2010-04-08 | Samsung Electronics Co., Ltd. | Method and apparatus for using service based on objects for implementing different functions of service |
US20100228859A1 (en) * | 2006-02-21 | 2010-09-09 | Baeckstroem Martin | Method and apparatus for providing access for a limited set of mobile stations to a restricted local access point |
US20110047030A1 (en) * | 2009-08-20 | 2011-02-24 | Electronics And Telecommunications Research Institute | Method and apparatus for providing/receiving mobile digital advertisement service |
US8018883B2 (en) * | 2007-03-26 | 2011-09-13 | Cisco Technology, Inc. | Wireless transmitter identity validation in a wireless network |
US20110321126A1 (en) * | 2010-05-24 | 2011-12-29 | Nanoradio Hellas A.E. | Method for wireless communication and wireless transmit/receive unit |
US20120114057A1 (en) * | 2010-11-05 | 2012-05-10 | Buffalo Inc. | Wireless communication device, wireless communication system and information notifying method |
US20120202469A1 (en) * | 2011-02-09 | 2012-08-09 | Platinum Tel Communications, LLC | Delivery of advertisements over voice network |
US8279880B2 (en) * | 2006-05-19 | 2012-10-02 | Schneider Electric Industries Sas | Communication gateway between wireless communication networks |
US20120314571A1 (en) * | 2006-07-05 | 2012-12-13 | Nokia Corporation | Ensuring quality of service for private short-range wireless networks |
US20120316940A1 (en) * | 2011-06-09 | 2012-12-13 | Mehran Moshfeghi | System and method for peer-to-peer communication and deal advertising |
US20130024883A1 (en) * | 2011-07-19 | 2013-01-24 | Elmaleh David R | System and method for access over a cable television network |
US20130036010A1 (en) * | 1995-06-06 | 2013-02-07 | At&T Intellectual Property I, L.P. | Receiving location based advertisements on a wireless communication device |
US20130238759A1 (en) * | 2012-03-06 | 2013-09-12 | Cisco Technology, Inc. | Spoofing technique for transparent proxy caching |
US20130308618A1 (en) * | 2012-05-17 | 2013-11-21 | Qualcomm Atheros, Inc | Driving hybrid location services from wlan stations using access points |
US20130317892A1 (en) * | 2012-05-25 | 2013-11-28 | Apple Inc. | Advertising, discovering, and using services through virtual access point interfaces |
US20130343364A1 (en) * | 2012-06-21 | 2013-12-26 | Broadcom Corporation | Proximity Detection |
US20140010150A1 (en) * | 2012-07-05 | 2014-01-09 | Gopal Agarwal | Location based service discovery |
US8713626B2 (en) * | 2003-10-16 | 2014-04-29 | Cisco Technology, Inc. | Network client validation of network management frames |
US20140269370A1 (en) * | 2013-03-15 | 2014-09-18 | Aruba Networks, Inc. | Dynamic Beamforming Configuration Based on Network Conditions |
US20140286321A1 (en) * | 2011-06-28 | 2014-09-25 | Hewlett-Packard Development Company, L.P. | Method of associating a client with an access point in a wireless local area network |
US20150012971A1 (en) * | 2013-07-08 | 2015-01-08 | Meru Networks | Deauthenticating and disassociating unauthorized access points with spoofed management frames |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7346338B1 (en) | 2003-04-04 | 2008-03-18 | Airespace, Inc. | Wireless network system including integrated rogue access point detection |
US7453840B1 (en) | 2003-06-30 | 2008-11-18 | Cisco Systems, Inc. | Containment of rogue systems in wireless network environments |
-
2014
- 2014-08-28 US US14/471,332 patent/US9661497B2/en active Active
Patent Citations (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130036010A1 (en) * | 1995-06-06 | 2013-02-07 | At&T Intellectual Property I, L.P. | Receiving location based advertisements on a wireless communication device |
US20030112789A1 (en) * | 2001-11-01 | 2003-06-19 | Tomi Heinonen | Local service handover |
US7483984B1 (en) * | 2001-12-19 | 2009-01-27 | Boingo Wireless, Inc. | Method and apparatus for accessing networks by a mobile device |
US7558960B2 (en) * | 2003-10-16 | 2009-07-07 | Cisco Technology, Inc. | Network infrastructure validation of network management frames |
US8713626B2 (en) * | 2003-10-16 | 2014-04-29 | Cisco Technology, Inc. | Network client validation of network management frames |
US20050259611A1 (en) * | 2004-02-11 | 2005-11-24 | Airtight Technologies, Inc. (F/K/A Wibhu Technologies, Inc.) | Automated sniffer apparatus and method for monitoring computer systems for unauthorized access |
US7370362B2 (en) * | 2005-03-03 | 2008-05-06 | Cisco Technology, Inc. | Method and apparatus for locating rogue access point switch ports in a wireless network |
US20100228859A1 (en) * | 2006-02-21 | 2010-09-09 | Baeckstroem Martin | Method and apparatus for providing access for a limited set of mobile stations to a restricted local access point |
US20070266236A1 (en) * | 2006-05-09 | 2007-11-15 | Colditz Nathan Von | Secure network and method of operation |
US8279880B2 (en) * | 2006-05-19 | 2012-10-02 | Schneider Electric Industries Sas | Communication gateway between wireless communication networks |
US20120314571A1 (en) * | 2006-07-05 | 2012-12-13 | Nokia Corporation | Ensuring quality of service for private short-range wireless networks |
US8018883B2 (en) * | 2007-03-26 | 2011-09-13 | Cisco Technology, Inc. | Wireless transmitter identity validation in a wireless network |
US20080240016A1 (en) * | 2007-03-27 | 2008-10-02 | Yigang Cai | Ims networks providing business-related content to wireless devices |
US20090016529A1 (en) * | 2007-07-11 | 2009-01-15 | Airtight Networks, Inc. | Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols |
US20090029691A1 (en) * | 2007-07-25 | 2009-01-29 | Microsoft Corporation | Base station initiated proximity service discovery and connection establishment |
US20100070760A1 (en) * | 2008-09-12 | 2010-03-18 | Qualcomm Incorporated | Ticket-based spectrum authorization and access control |
US20100067504A1 (en) * | 2008-09-18 | 2010-03-18 | Alcatel Lucent | System and method for exposing malicious clients in wireless access networks |
US20100088732A1 (en) * | 2008-10-02 | 2010-04-08 | Samsung Electronics Co., Ltd. | Method and apparatus for using service based on objects for implementing different functions of service |
US20110047030A1 (en) * | 2009-08-20 | 2011-02-24 | Electronics And Telecommunications Research Institute | Method and apparatus for providing/receiving mobile digital advertisement service |
US20110321126A1 (en) * | 2010-05-24 | 2011-12-29 | Nanoradio Hellas A.E. | Method for wireless communication and wireless transmit/receive unit |
US20120114057A1 (en) * | 2010-11-05 | 2012-05-10 | Buffalo Inc. | Wireless communication device, wireless communication system and information notifying method |
US20120202469A1 (en) * | 2011-02-09 | 2012-08-09 | Platinum Tel Communications, LLC | Delivery of advertisements over voice network |
US20120316940A1 (en) * | 2011-06-09 | 2012-12-13 | Mehran Moshfeghi | System and method for peer-to-peer communication and deal advertising |
US20140286321A1 (en) * | 2011-06-28 | 2014-09-25 | Hewlett-Packard Development Company, L.P. | Method of associating a client with an access point in a wireless local area network |
US20130024883A1 (en) * | 2011-07-19 | 2013-01-24 | Elmaleh David R | System and method for access over a cable television network |
US20130238759A1 (en) * | 2012-03-06 | 2013-09-12 | Cisco Technology, Inc. | Spoofing technique for transparent proxy caching |
US20130308618A1 (en) * | 2012-05-17 | 2013-11-21 | Qualcomm Atheros, Inc | Driving hybrid location services from wlan stations using access points |
US20130317892A1 (en) * | 2012-05-25 | 2013-11-28 | Apple Inc. | Advertising, discovering, and using services through virtual access point interfaces |
US20130343364A1 (en) * | 2012-06-21 | 2013-12-26 | Broadcom Corporation | Proximity Detection |
US20140010150A1 (en) * | 2012-07-05 | 2014-01-09 | Gopal Agarwal | Location based service discovery |
US20140269370A1 (en) * | 2013-03-15 | 2014-09-18 | Aruba Networks, Inc. | Dynamic Beamforming Configuration Based on Network Conditions |
US20150012971A1 (en) * | 2013-07-08 | 2015-01-08 | Meru Networks | Deauthenticating and disassociating unauthorized access points with spoofed management frames |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10908803B1 (en) | 2013-03-15 | 2021-02-02 | Study Social, Inc. | Collaborative, social online education and whiteboard techniques |
US10908802B1 (en) | 2013-03-15 | 2021-02-02 | Study Social, Inc. | Collaborative, social online education and whiteboard techniques |
US11061547B1 (en) | 2013-03-15 | 2021-07-13 | Study Social, Inc. | Collaborative, social online education and whiteboard techniques |
US20190014518A1 (en) * | 2017-07-04 | 2019-01-10 | Canon Kabushiki Kaisha | Communication apparatus, external apparatus, control method for communication apparatus, control method for external apparatus, and non-transitory computer-readable storage medium |
US10959146B2 (en) * | 2017-07-04 | 2021-03-23 | Canon Kabushiki Kaisha | Communication apparatus, external apparatus, control method for communication apparatus, control method for external apparatus, and non-transitory computer-readable storage medium |
US11037675B1 (en) * | 2018-03-05 | 2021-06-15 | Securas Technologies, LLC | Screening-based availability of communications device features |
Also Published As
Publication number | Publication date |
---|---|
US9661497B2 (en) | 2017-05-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11064353B2 (en) | Infrastructure coordinated media access control address assignment | |
US8825767B2 (en) | Scalable secure wireless interaction enabling methods, system and framework | |
US9210536B2 (en) | Method for establishing device-to-device communication | |
US8208472B2 (en) | Method and apparatus for setting up network for IP communication in mobile terminal | |
US8732283B2 (en) | Management of network membership | |
KR102150659B1 (en) | A method for discovering devices based on a location information and apparatus thereof | |
EP3058693B1 (en) | Selection and use of a security agent for device-to-device (d2d) wireless communications | |
RU2639696C2 (en) | Method, device and system for maintaining activity of access session on 802,1x standard | |
US9794119B2 (en) | Method and system for preventing the propagation of ad-hoc networks | |
US20190297119A1 (en) | Establishing direct secure connection between collaboration devices in a room or space | |
EP4055860B1 (en) | Open access in neutral host network environments | |
US8312151B2 (en) | Communication systems and methods for dynamic and secure simplification of equipment networking | |
US9661497B2 (en) | Control and enhancement of direct wireless service communications | |
Nguyen et al. | An SDN‐based connectivity control system for Wi‐Fi devices | |
US20230299954A1 (en) | Secure provisioning of communications channels | |
US20180103076A1 (en) | Method of providing automotive miracast and apparatus therefor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HENRY, JEROME;MYLES, ANDREW;HUOTARI, ALLEN J.;SIGNING DATES FROM 20140821 TO 20140828;REEL/FRAME:033689/0834 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |